Click here to read our latest report “30 Years of Trends in Terrorist and Extremist Games”

Home

Insights
  • Apr152025

    Attack at the Pear Tree Inn: An Analysis of a British Terrorist’s Manifesto

    The following is a Special Extended Insight  Content warning: racial and antisemitic slurs. Manifesto and…

  • Apr112025

    Automated Recruitment: Artificial Intelligence, ISKP, and Extremist Radicalisation

    Introduction The role of artificial intelligence in terrorist recruitment has grown exponentially, which has had…

  • Apr092025

    Mapping ISKP’s Strength: Social Network Analysis of Tech-Driven Jihad 

    Introduction The Islamic State (IS) has evolved to be one of the most serious threats…

  • Apr032025

    Anonymity, Performance, and Identity: An Analysis of the Antioch Shooting

    Introduction On 22 January 2025, a shooting at Antioch High School in Nashville, Tennessee, left…

  • Mar312025

    When Grandpa Turns Extremist: Digital Immigrants,  Radicalisation and the German Reich Citizens Movement

    Introduction      Online radicalisation studies and P/CVE research, more broadly, tend to focus primarily…

  • Mar272025

    The Great TikTok Migration: Western Extremists Flock to RedNote

    Introduction  Following the announcement on 15 January that TikTok would be banned in the United…

  • Mar242025

    Cryptocurrency and Extremism: How Social Network Analysis is Used to Track Extremist Cryptocurrency Donations

    Introduction Among the digital tools emerging in today’s decentralised financial framework, cryptocurrency has been especially…

  • Mar202025

    Building Tech Capacity: Cross-Cultural, Gender-Responsive Solutions to Prevent Extremism in Gaming

    Introduction  When discussing social harms in online gaming spaces, the term “toxicity” frequently takes centre…

  • Mar182025

    Digital Pathways to Violence: the Tech Ecosystem Behind the Antioch Shooting

    Introduction: Technology, Radicalisation, and Security Failures On 22 January 2025, a 17-year-old student carried out…

  • Mar142025

    Sadaqah Jariyah: The Thriving Cryptocurrency Fundraising Efforts Behind ISKP’s Official Media

    Methodology The authors monitored the official and unofficial channels, as well as internal discussions of…

  • Mar132025

    Free the Captives: Islamic State Central Asian Fundraising Networks in Support of IS Families in Syria and Iraq

    Methodology The authors monitored the financial and propaganda activities of IS women and ISKP propagandists…

  • Mar122025

    The Rise of Hayat Tahrir al-Sham in Syria: From Wartime Propaganda to Diplomatic Rhetoric

    Introduction Less than two weeks were enough for the Hayat Tahrir al-Sham (HTS)-led ‘Operations Room’…

Reports